Analysis
-
max time kernel
9s -
max time network
37s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe
Resource
win10v2004-20220812-en
General
-
Target
6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe
-
Size
1.5MB
-
MD5
05a2161c9448ceb0c119e54c9c8187fb
-
SHA1
3e295a2de5504cf867a5d57dfa6a494f2b50cc39
-
SHA256
6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3
-
SHA512
688b0035b32ad0dbb6c2964b65da93e126363a952866bdf81c97c8cab4f8e9b4bd7ee4edee0c4242d744c2ac430218ae2b0daa078116510e8c93b3ee02015f62
-
SSDEEP
24576:Hpa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eG9:wcZC35VcOcmDcc6Cd3
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2028 set thread context of 548 2028 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 524 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 548 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 548 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 548 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 548 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 548 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1016 2028 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 28 PID 2028 wrote to memory of 1016 2028 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 28 PID 2028 wrote to memory of 1016 2028 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 28 PID 2028 wrote to memory of 1016 2028 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 28 PID 2028 wrote to memory of 548 2028 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 30 PID 2028 wrote to memory of 548 2028 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 30 PID 2028 wrote to memory of 548 2028 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 30 PID 2028 wrote to memory of 548 2028 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 30 PID 2028 wrote to memory of 548 2028 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 30 PID 2028 wrote to memory of 548 2028 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 30 PID 1016 wrote to memory of 524 1016 cmd.exe 31 PID 1016 wrote to memory of 524 1016 cmd.exe 31 PID 1016 wrote to memory of 524 1016 cmd.exe 31 PID 1016 wrote to memory of 524 1016 cmd.exe 31 PID 2028 wrote to memory of 548 2028 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 30 PID 2028 wrote to memory of 548 2028 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 30 PID 2028 wrote to memory of 548 2028 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 30 PID 2028 wrote to memory of 548 2028 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 30 PID 2028 wrote to memory of 548 2028 6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe"C:\Users\Admin\AppData\Local\Temp\6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:524
-
-
-
C:\Users\Admin\AppData\Local\Temp\6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe"C:\Users\Admin\AppData\Local\Temp\6cbb00df7b628146629ca38b815b65ae72617525ee35ca0d0160f23d4744ebe3.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:548
-